Complexity of Virtualization Security Starts to Rise

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Complexity of Virtualization Security Starts to Rise-1 Next

Click through for results from a virtualization survey conducted by Altor Networks.

When it comes to virtualization security in the enterprise, the times are definitely changing.

According to a survey of over 200 IT professionals conducted during the recent VMworld 2010 conference by Altor Networks, a provider of firewall software that runs on top of a hypervisor, the number of application workloads running on top of virtual machines that need to be secured is increasing.

The bad news, says Johnnie Konstantas, vice president of marketing for Altor Nertworks, is that many IT organizations are violating best practices when running those application workloads. Instead of making sure that all the virtual application workloads are running on a particular physical server, most IT organizations report they are running mixed application workloads on top of virtual machines that share the same physical server.

That may be more economical in terms of increasing server utilization rates, but as Konstantas points out, it increases security risks should any one of those application workloads be compromised.

The other major challenge with virtualization security is that the workloads are becoming more dynamic. As more virtual machines are spun up across the enterprise, it’s more difficult for security professionals to keep pace with the infrastructure changes. Inevitably, this leads to some period of time when new application workloads are going to be left unprotected.

Finally, it’s not at all clear if the security teams and the people charged with running the virtual machine environments are cooperating more or if the types of people in charge of securing the virtual environment differ from company to company.

IT organizations are becoming more conscious about security issues related to virtualization in general and just because an application workload is running on top of a virtual machine doesn’t mean it’s secure.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT_Man89-290x195 9 Tips for Running a 'Tween' Company

Advice and tips for entrepreneurs and companies that are no longer startups but not quite ready for an IPO, also known as "tweens." ...  More >>

IT_Man88-190x128 Top 5 Trends Affecting Women-Owned Micro Businesses

Learn more about the challenges and opportunities presented to women leaders, especially micro-business owners. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.